Event Updates

Latest Content tagged with Black Hat
Page 1 / 2   >   >>
Black Hat Asia 2018:
First Briefings Announced
Event Updates  |  12/13/2017  | 
Black Hat Asia returns to Singapore, March 20-23, 2018 with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier solutions and service providers in the Business Hall, and more.
Black Hat Europe 2017:
New Briefings Announced
Event Updates  |  10/18/2017  | 
Final Batch of Black Hat Europe 2017 Briefings Released
Black Hat Europe 2017:
New Briefings Announced
Event Updates  |  9/27/2017  | 
We are pleased to announce More Briefings selected for presentation at Black Hat Europe 2017!
Black Hat Europe 2017:
First Briefings Announced
Event Updates  |  9/20/2017  | 
We are pleased to announce the first Briefings selected for presentation at Black Hat Europe 2017!
Black Hat USA 2017:
Know Before You Go
Event Updates  |  7/19/2017  | 
Black Hat USA 2017:
Attendee Survey Results
Event Updates  |  7/6/2017  | 
Today, Black Hat releases its third annual research report entitled, Portrait of an Imminent Cyber Threat. Download a copy for actionable insights and information on critical industry trends.
Black Hat USA 2017:
Data Forensices and Incident Response Roadmap
Event Updates  |  6/5/2017  | 
Strong data forensics and incident response capabilities are critical for agile breach detection and mitigation. Challenges of multiple access points, the influx of mobile and connected devices and the large amount of resulting data makes this an arduous task. Build these highly sought after skills at Black Hat USA with the Data Forensics and Incident Response track
Black Hat USA 2017:
Predominance of Internet of Things
Event Updates  |  5/30/2017  | 
Expected rise in IoT breaches and complexities points to a need for advanced knowledge of IoT practicalities and fundamentals. Navigate the dynamic threat landscape with these Black Hat USA offerings and view the Briefings IoT Track to begin customizing your Black Hat USA experience.
Black Hat USA 2017: 35 New Briefings Announced
Event Updates  |  5/4/2017  | 
We are pleased to announce 35 new Briefings selected for presentation at Black Hat USA 2017!
Black Hat USA 2017:
Security Challenges in the Enterprise
Event Updates  |  5/2/2017  | 
Growing costs of incident management and remediation have heightened the need for new breach mitigation strategies and tools. Enterprise systems are particularly susceptible to compromise with unique challenges to risk visibility and assessment. Unobstructed view and comprehensive knowledge of the threat surface is critical to preempting attack vectors and mitigating breach incidents.
Black Hat USA 2017: 15 New Briefings Announced
Event Updates  |  4/27/2017  | 
We are pleased to announce 15 new Briefings selected for presentation at Black Hat USA 2017!
Black Hat Review Board Spotlight:
Beyond the Bio with Jamie Butler
Event Updates  |  3/14/2017  | 
Get to know the Black Hat Review Board in a new interview series, Beyond the Bio. In this series, Black Hat Review Board Members offer insight from their favorite exploits and pastimes to their most memorable Black Hat experiences.
Black Hat Asia 2017:
CISOs Must Get Proactive about the Internet of Things
Event Updates  |  3/13/2017  | 
These four steps will help reduce the risk from looming IoT attacks
Black Hat Asia 2017:
Pentesting for Vulnerabilities
Event Updates  |  3/9/2017  | 
Continually testing for vulnerabilities is critical to threat detection and prevention
Black Hat Asia 2017:
Securing Mobile Devices
Event Updates  |  3/8/2017  | 
Opportunities for phishing, ransomware, cryptocurrency mining and other attacks are endless. Understanding mechanisms for compromising Android and iOS systems is crucial to detecting and preventing security breaches.
Black Hat Asia 2017:
Threat & Vulnerability Management: Knowing Youre Secure
Event Updates  |  3/7/2017  | 
Threat and vulnerability management is a foundational technique that every security professional should embrace. Heres why.
Black Hat Europe 2016:
Introducing RegTech: Cloud-based Tools For Regulatory Compliance
Event Updates  |  10/25/2016  | 
As regulatory requirements grow in volume and complexity in Europe and globally, cloud computing is emerging as a key tool to help companies manage compliance processes.
Black Hat Europe 2016:
How Artificial Intelligence Will Liberate Security
Event Updates  |  10/24/2016  | 
The security paradigm is shifting to one of security as a science with AI as the primary agent for that revolutionary change.
Black Hat Europe 2016:
The 7 Habits of Highly Effective Security Operations
Event Updates  |  10/21/2016  | 
Why cyber analysts spend nearly 75% if their time on false positives, and what to do about it.
Black Hat Europe 2016:
5 Best Practices for Defending Against a Cyberattack
Event Updates  |  10/19/2016  | 
The proactive management of cybersecurity relies on an intelligence-led approach that can either prevent a breach from happening, or make sure that it is quickly detected and remediated.
Black Hat Europe 2016:
Whats Next For Ransomware & How To Prevent It
Event Updates  |  10/18/2016  | 
Ransomware has existed in various forms for decades, but in the last three years, cybercriminals have perfected its key components. Heres what you need to know now.
Black Hat Europe 2016:
BooleBox: A New Perspective On Enterprise Data Protection
Event Updates  |  10/10/2016  | 
The thought of sensitive data ending up in the wrong hands can keep both IT administrators and top-managers awake at night. As the latest trends show, many organizations are gaining more and more awareness about the various existing threats to their intellectual property and confidential information.
Black Hat Europe 2016 Sponsor Content:
Whats In Your Armoury For Discovering Software Vulnerabilities?
Event Updates  |  10/5/2016  | 
The process of locating, identifying and targeting software vulnerabilities has changed beyond measure in the last 20 years. Automated tools are a huge factor in this and have made the whole process a lot easier, yet subtle and esoteric weaknesses are beginning to creep into software and they arent easy to spot.
Its Time For Legacy AV To Leave The Building: #legxit
Event Updates  |  9/29/2016  | 
[Black Hat Europe 2016 Sponsor Content: SentinelOne]
Ransomware Rages On
Event Updates  |  9/28/2016  | 
[Black Hat Europe 2016 Sponsor Content: iboss Cybersecurity]
Black Hat Europe 2016: Penetration Testing is Key in Enhancing Your Security
Event Updates  |  8/17/2016  | 
Last year, 594 million people were affected by cybercrime around the world (according to Norton Cybersecurity Insights Report). Cyber attacks will only become more sophisticated in the years to come. As the severity of online attacks continue to escalate, it is critical to find ways to mitigate potential exploits. Penetration testing is a great method of detecting vulnerabilities in your systems or devices and weve highlighted a few Black Hat Trainings that can truly enhance your skills.
Black Hat USA 2016: Beware of Malware
Event Updates  |  6/30/2016  | 
Over 430 million new pieces of malware were discovered last year, a 36% increase from the previous year (according to Symantec). Malware attacks are projected to rise in volume and frequency. Hackers are becoming more skilled at detecting vulnerabilities and commonly use malware as their method of attack. It is critical to be aware of the current malware threats and learn how you can defuse potential exploits.
Black Hat USA 2016: Windows Security
Event Updates  |  6/15/2016  | 
Microsofts Windows dominates the OS landscape, accounting for 89% of the market (according to Hot Hardware), and the latest Windows upgrade, Windows 10, is now running on 300 million active devices worldwide (reported by Microsoft). Being the leader in the space also makes Windows a huge target for hackers who constantly scan for vulnerabilities in the system.
Black Hat USA 2016: Digital Communication Security
Event Updates  |  6/6/2016  | 
In a global population of 7.395 billion people, 3.419 billion people are internet users and of those, 2.307 billion people communicate via social media (according to the study Digital in 2016 by We Are Social). Since a large portion of the worlds population communicates using the internet, cyber security is a priority for users.
Black Hat USA 2016: Mobile Hacking
Event Updates  |  5/17/2016  | 
Over 1.4 billion people across the world are using Android devices, according to Google. Unlike Apples iOS, Android is not tied to a specific manufacturer, allowing it to account for 81.6% of the smartphone operating system market (Statistica). However, since Android dominates the smartphone market, it presents an ideal opportunity for hackers to tap into a large base of user information. Its essential for Android users, as well as iOS users, to learn how to protect themselves.
Black Hat USA 2016: Locking Down Your Platform Security
Event Updates  |  5/3/2016  | 
Only 38% of international organizations reveal they feel prepared to handle a sophisticated cyberattack, according to ISACA International (2015 Global Cybersecurity Status Report). The refinement of hacking technology is continuously evolving and learning how to heighten your security measures is critical. Not taking an active role in improving platform security could put your companys proprietary information at risk.
Black Hat Europe 2015: Just the Attacks, Ma'am
Event Updates  |  10/27/2015  | 
Allow us to channel an early 2000, sweating, hyperkinetic Steve Ballmer: exploits, exploits, exploits, exploits! Today's Black Hat Europe 2015 Briefing highlights are all about novel and sometimes devastating new attacks against systems of all kinds. Can they get you as pumped up as Steve? Let's find out.
Black Hat Europe 2015: Gaps in the Corporate Armor
Event Updates  |  10/20/2015  | 
In today's Intel Update, we're going big... enterprise big, with a selection of Black Hat Europe 2015 Briefing highlights that focus on vulnerabilities affecting large organizations. Few targets are more tempting to criminals (or have more to lose) so let's take a peek at a few promisingly tender spots tucked behind corporate veils.
Black Hat Europe 2015: The Best Response
Event Updates  |  10/13/2015  | 
Forensics and incident response: two disciplines in ever-higher demand in today's world of subtle intrusions and stealthy attacks. This trio of Black Hat Europe 2015 Briefings highlights grapple with different aspects of the art of intelligent counter-intelligence.
Black Hat Europe 2015: Cracking Crypto
Event Updates  |  9/28/2015  | 
It's largely thanks to the hard work of decades of cryptographers that we're able to keep so much sensitive data safe, secret, and secure. But today's Black Hat Europe 2015 Briefing highlights remind that no crypto scheme's unbeatable, showcasing a variety of attacks with the potential to lay bare important secrets.
Black Hat Europe 2015: Ready to Play Defense?
Event Updates  |  9/24/2015  | 
Implementing a strong defensive posture might not garner much overt recognition, but a job well done will let you sleep well, knowing the crown jewels are safely out of reach of most intruders. Today's trio of Black Hat Europe 2015 Briefings all focus on closing loopholes and hardening systems, all the better for getting that 7.5 hours of sleep doctors keep harping on.
Black Hat Europe 2015: 4 Days Left for Early Bird Rates
Event Updates  |  9/1/2015  | 
Come November, Black Hat, the premier conference on information security, will return to Amsterdam for Black Hat Europe 2015. Some of the industry's brightest minds will deliver two days of Black Hat's signature Briefings and two days of cutting-edge Trainings to bring you up to speed on a diverse range of intriguing and timely InfoSec research. In today's inaugural Black Hat Europe intel update, we'll check out nine diverse Briefings.
Black Hat USA 2015: Breaking Windows
Event Updates  |  7/30/2015  | 
It wouldn't be a proper Black Hat event without a host of interesting new exploits for Microsoft's widely used operating systems, so here are four Black Hat USA 2015 Briefings that will teach you how to break Windows in fresh new ways.
Black Hat USA 2015: Let's Get Physical
Event Updates  |  7/28/2015  | 
It's tempting to think of InfoSec purely in virtual terms, as electrons flowing through circuits and logic gates. But these microscopic events can affect the human-scale physical world, and unexpected physical interventions can also break seemingly secure micro-systems. Today's trio of Black Hat USA 2015 Briefings all demonstrate how this street runs both ways.
Black Hat USA 2015: Border Patrol
Event Updates  |  7/23/2015  | 
Border Gateway Protocol (BGP) is the fabric of routing on the Internet today, with a approximately half a million routes between 50,000 autonomous systems. Sounds like a ripe target for malicious parties to exploit, which is the gist of today's trio of Black Hat Briefing highlights.
Black Hat USA 2015: The Hard Stuff
Event Updates  |  7/21/2015  | 
Software gets much of the hacking spotlight, perhaps understandably so. But the physical infrastructure that runs all that code is just as susceptible to messing with, though it takes a different set of knowledge and techniques. Today's Training trio touch on the more solid side of that divide.
Black Hat USA 2015: Exploit Dev Story
Event Updates  |  7/20/2015  | 
Exploits don't just materialize out of thin air: Finding them is often a huge challenge in itself. Today's Black Hat USA 2015 Trainings all focus on helping you find the weak points in complicated systems, all the better to exploit them.
Black Hat USA 2015: Briefings Begin
Event Updates  |  6/25/2015  | 
You know a Black Hat event is, if not quite imminent, at least on the horizon when we start rolling out intel updates for our Briefings. Briefings are the world-class, widely diverse, super-fresh tech presentations our shows are famous for. And intel updates? You're in one. Our first topic is one we've seen a lot in the news lately: the capacity for computers to learn.
Black Hat USA 2015: Best of the Rest
Event Updates  |  6/12/2015  | 
Today's Black Hat USA 2015 Training update has a little bit of everything, a quartet of intriguing Trainings that didn't quite fit in elsewhere. Spoiler: You're gonna build a drone!
Black Hat USA 2015: Digital Detectives
Event Updates  |  6/5/2015  | 
Was someone here? What did they do? And are they still doing it? If you can't routinely answer those questions, your computer infrastructure is at risk. Forensics is the art of filling in those answers, pointing the way toward an effective response and hopefully better defenses in the future, and is the focus of today's trio of Black Hat USA 2015 Trainings.
Black Hat USA 2015: Two for One
Event Updates  |  5/21/2015  | 
Malware and Crypto are our topics today, and we've got two hot Black Hat USA 2015 Trainings in each to cover. So without further ado...
Black Hat USA 2015: Secret Systems
Event Updates  |  5/19/2015  | 
Supervisory control and data acquisition (SCADA) systems keep the world's vital systems running smoothly, until they don't, which is the only time most people become aware of these crucial embedded systems. Today's trio of Black Hat USA 2015 Trainings will carry you well beyond awareness, taking you on a deep dive into the little-known yet high-stakes world of SCADA security testing.
Black Hat USA 2015: Targeted Attacks
Event Updates  |  5/8/2015  | 
Many Black Hat Trainings teach generalized techniques applicable to many domains, but today we're highlighting three Black Hat USA 2015 Trainings that will focus on exploiting specific operating systems.
Black Hat USA 2015: Pentesting: The Final Tier
Event Updates  |  4/30/2015  | 
In case Black Hat USA 2015's beginner-level and intermediate-level penetration test programming seemed unsuited to your skill level, today we present our final tier of penetration testing trainings. If these advanced courses don't raise an eyebrow, well, maybe you should be teaching one, too.
Page 1 / 2   >   >>

How to Attract More Women Into Cybersecurity - Now
Dawn Kawamoto, Associate Editor, Dark Reading,  1/12/2018
Researchers Offer a 'VirusTotal for ICS'
Kelly Jackson Higgins, Executive Editor at Dark Reading,  1/16/2018
Which CISO 'Tribe' Do You Belong To?
Kelly Sheridan, Associate Editor, Dark Reading,  1/17/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.